All Articles in Internet Law

Common Carriage’S Domain, Christopher S. Yoo

Faculty Scholarship at Penn Law

The judicial decision invalidating the Federal Communications Commission’s first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the lessons from the history and the academic literature on common carriage. This Essay distills these learnings into five factors that play a key role in promoting common carriage’s success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet suggests ...

Front Matter

Science and Technology Law Review

Search Query: Can America Accept A Right To Be Forgotten As A Publicity Right?, James J. Lavelle

Brooklyn Law Review

Search engines have profoundly changed the relationship between privacy and free speech by making personal information widely and cheaply available to a global audience. This has raised many concerns both over how online companies handle the information they collect and how regular citizens use online services to invade other people’s privacy. One way Europe has addressed this change is by providing European Union citizens with a right to petition search engines to deindex links from search results—a so-called “right to be forgotten.” If the information contained in a search result is “inadequate, irrelevant or no longer relevant,” the ...

Brooklyn Journal of Corporate, Financial & Commercial Law

The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact ...

The Naked Truth: Insufficient Coverage For Revenge Porn Victims At State Law And The Proposed Federal Legislation To Adequately Redress Them, Meghan Fay

Boston College Law Review

The distribution of revenge porn is a cyber-bullying phenomenon that has proliferated on the Internet. The nonconsensual sharing of sexually explicit photographs and videos causes irreparable harm to revenge porn victims. The current state of the law, however, does little to redress the damage. Tort claims are often unsuccessful because many victims do not have the resources necessary to initiate a lawsuit. Furthermore, federal law grants operators of revenge porn websites immunity from state tort claims. In an effort to fill this gap in the law, many states have made changes or additions to their criminal statutes. To date, thirty-eight ...

Maryland Law Review

The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders

Utah Law Review

In a sense, war has not changed. The end results will always remain the same: death and destruction; even if that destruction is not fully tangible. The results may be instantaneous, or they may be delayed. It is only the means implemented to achieve these destructive ends that evolve. Cyberwarfare is a product of that evolution. Most importantly, we must always remain abreast of evolution and the changes in warfare in order to effectively and efficiently respond to new attacks, and to prevent them as well.

This Note sheds light on recent evolution in warfare. It enlightens the reader of ...

Ethereum And The Sec: Why Most Distributed Autonomous Organizations Are Subject To The Registration Requirements Of The Securities Act Of 1933 And A Proposal For New Regulation, Tiffany L. Minks

Texas A&M Law Review

In a world full of new technology, the risk of fraud is constantly increasing. In the securities industry, this risk existed long before the use of technology. Congress enacted the Securities Act of 1933 to combat the risk of fraud and misrepresentation in the sale of securities. By requiring full disclosure, investors have the opportunity to make informed decisions prior to investing. However, Distributed Autonomous Organizations (“DAOs”), through the use of blockchains and smart-contracts, engage in the sale of securities without fully disclosing the risks or complying with the registration requirements of the Securities Act of 1933. Compliance with the ...

Lawyers' Abuse Of Technology, Cheryl B. Preston

Cornell Law Review

Lawyers are highly educated and, allegedly, of higher than average intelligence, but sometimes individual lawyers demonstrate colossal errors in judgment, especially when insufficiently trained in the new and emerging risks involved with the technological age. For instance, although the internet is a necessary tool for attorneys' and is now a prominent feature in the everyday lives of all actors in the legal system, this technology poses particularized and often unanticipated risks of professional and ethical abuse -- risks that are extraordinary both in quantity and intensity. As Harvard's Director of the Center for the Legal Profession warned: We are "only ...